TypeClassroom Training
Time5 Days
REGISTER

Contact Us

Fields marked with an * are required
CISSP Training Course & Certification

CISSP Training – Certified Information System Security Professional Training Course & Certification

Description

Audience & Prerequisites

Certification

CISSP Training Course & Certification

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.

  • Analyze components of the Security and Risk Management domain.
  • Analyze components of the Asset Security domain.
  • Analyze components of the Security Engineering domain.
  • Analyze components of the Communications and Network Security domain.
  • Analyze components of the Identity and Access Management domain.
  • Analyze components of the Security Assessment and Testing domain.
  • Analyze components of the Security Operations domain.
  • Analyze components of the Software Development Security domain.

Intended Audience of CISSP Training

This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in two or more fields related to the eight CBK security domains, or a college degree and four years of experience.

Prerequisites for CISSP Certification Course

It is highly recommended that students have certifications in Network+ or Security+, or possess equivalent professional experience upon entering CISSP training. It will be beneficial if students have one or more of the following security-related or technology-related certifications or equivalent industry experience: CyberSec First Responder (CFR), MCSE, CCNP, RHCE, LCE, SSCP®, GIAC, CISA™, or CISM®.

  • Number of Questions: 250 Questions
  • Duration: Up to 6 hours
  • Test Format: Multiple Choice
  • Passing Score: 70%
  • Testing Center: Pearson VUE Testing Center
Section 1Security and Risk Management
Lecture 1Security Governance Principles
Lecture 2Compliance
Lecture 3Professional Ethics
Lecture 4Security Documentation
Lecture 5Risk Management
Lecture 6Threat Modeling
Lecture 7Business Continuity Plan Fundamentals
Lecture 8Acquisition Strategy and Practice
Lecture 9Personnel Security Policies
Lecture 10Security Awareness and Training
Section 2Asset Security
Lecture 11Asset Classification
Lecture 12Privacy Protection
Lecture 13Asset Retention
Lecture 14Data Security Controls
Lecture 15Secure Data Handling
Section 3Security Engineering
Lecture 16Security in the Engineering Lifecycle
Lecture 17System Component Security
Lecture 18Security Models
Lecture 19Controls and Countermeasures in Enterprise Security
Lecture 20Information System Security Capabilities
Lecture 21Design and Architecture Vulnerability Mitigation
Lecture 22Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
Lecture 23Cryptography Concepts
Lecture 24Cryptography Techniques
Lecture 25Site and Facility Design for Physical Security
Lecture 26Physical Security Implementation in Sites and Facilities
Section 4Communications and Network Security
Lecture 27Network Protocol Security
Lecture 28Network Components Security
Lecture 29Communication Channel Security
Lecture 30Network Attack Mitigation
Section 5Identity and Access Management
Lecture 31Physical and Logical Access Control
Lecture 32Identification, Authentication, and Authorization
Lecture 33Identity as a Service
Lecture 34Authorization Mechanisms
Lecture 35Access Control Attack Mitigation
Section 6Security Assessment and Testing
Lecture 36System Security Control Testing
Lecture 37Software Security Control Testing
Lecture 38Security Process Data Collection
Lecture 39Audits
Section 7Security Operations
Lecture 40Security Operations Concepts
Lecture 41Physical Security
Lecture 42Personnel Security
Lecture 43Logging and Monitoring
Lecture 44Preventative Measures
Lecture 45Resource Provisioning and Protection
Lecture 46Patch and Vulnerability Management
Lecture 47Change Management
Lecture 48Incident Response
Lecture 49Investigations
Lecture 50Disaster Recovery Planning
Lecture 51Disaster Recovery Strategies
Lecture 52Disaster Recovery Implementation
Section 8Software Development Security
Lecture 53Security Principles in the System Lifecycle
Lecture 54Security Principles in the Software Development Lifecycle
Lecture 55Database Security in Software Development
Lecture 56Security Controls in the Development Environment
Lecture 57Software Security Effectiveness Assessment